Organise your Files and Folders

August 4th, 2014

FilingYour PC or Laptop is just like a big filing cabinet and, like your filing, if you’re not organised about where you store things it makes it harder to retrieve documents. In addition, if you don’t know where your data is on your hard drive it makes it harder to transfer everything to a new PC or laptop and also make sure your important files are being backed up.

So where do you start? Here are a few hints and tips to help you get going.

Use My Documents

Each User that has been set up on your PC or Laptop will have its own profile. Within this profile a number of default folders are set up for you, which make it easy to file your Documents, Photos, Videos and Music. It’s a good idea to use these folders as a starting point as they will often be used as a default location for applications to save their files to, like iTunes or your Camera.

Create your folder structure

My DocumentsUnder these Top level folders, you can create sub folders to make it easier to find individual items.

To create a New Folder, open up the top level folder and then either select New Folder from the menu bar at the top or right-click and select New >> Folder. Give your Folder a relevant name.

You can then save items in to your new folder.

Libraries

Libraries are not folders in their own right but offers an easy way to access your most used folders.

File iconYour default My Documents, Photos, Videos and Music folders are included but you can add any other folders in too by right-clicking and selecting Add to Library.

This can be useful if you also want to use cloud-based storage such as DropBox or OneDrive, as these can be added in to your libraries too.

Moving your Files

If you want to move files and folders then there are a couple of ways to do this. The first is to select the files or folders you wish to move (use the Shift key to select multiple items) and then copy them (press Ctrl+C or right-click >>Copy); navigate to the new location and Paste (Ctrl+P or right-click > Paste). This will duplicate your items to the new location so you will need to go back and delete the originals when you are sure they have copied.

You can also select your items and use the mouse or touchpad to drag and drop items between folders. This will move items and you need to be sure of where you have ‘dropped’ them as it is easy to move items into a different folder to that intended!

Organise your Programs and Apps

July 28th, 2014

Download softwareOver time your PC, laptop, tablet or phone can get clogged up with unwanted programs and apps.

We all download or install things either for a one-off use or just to see what they are like and then leave them sitting there.

Although these days most modern systems have ample hard disk space to cope with having these items lying around, some can eat up your system resources and slow down your system by running in the background.

So how can you tidy up your PC, laptop, tablet or phone and get rid of unwanted programs? There’s a few simple steps but do be careful and remember that if in any doubt as to what a program is or does, consult an expert before removing it!

Add or remove programsPC, Laptop or Windows 8 Tablet

Whether you are running Windows 7, Windows 8 or Windows 8.1 the process for viewing and removing programs is done via Control Panel. In Windows 7 this can be found in the Start Menu, in Windows 8/8.1 search for Control Panel. Within there you will find a Programs and Features option.

Open this and it will populate with a list of all the items installed on your device. Look down the list for any programs you know you no longer need. Look out for toolbars or clean-up tools that may have been installed accidently with other programs, printer and scanner software for devices you no longer have etc.

To remove a program, highlight it and click uninstall. Wait for the software to run its uninstall process. It may need to reboot afterwards to complete the uninstallation but you don’t have to do this after every item, work your way down the list and then remember to reboot at the end. You can only uninstall one item at a time and be patient – some items can take a little while and may appear not to be doing anything!

iPhonePhone or Other Tablet

Removing Apps from a phone can be done I a similar way. On the iPhone, simply press and hold on an App’s icon. They will start to move and a cross will appear in the corner of each. Click the cross to remove that App. When finished, press the on/off button to go back to the main screen.

Windows phones are similar, tap and hold the icon then select uninstall.

On an Android device, Visit your device’s Settings menu > Apps or Application manager (this may differ depending on your device). Touch the app you’d like to uninstall, select Uninstall.

Mac App folderMAC

Generally, removal of applications from the Mac OS X is a simple process.

Navigate to the Applications folder and you will see icons for all your installed programs. Simply drag the unwanted program’s icon to the Trash bin to start the uninstall process.

Occasionally, some remnants of a program may remain in the Library folders, one is in the top level of your hard drive, the other is within the Home folder. You will need to search through these folders to find anything related to the program or vendor of the item you are uninstalling. Be careful as there may be similar programs installed which you don’t want to get rid of!

If your device is running slowly and removing unwanted programs, apps and files hasn’t helped we offer a clean up and update service. Click here for more details.

Customise Your Desktop

July 21st, 2014

If you have a new PC or laptop then you probably want to make it a little bit more ‘you’. There are a few things you can do to customise your desktop to give it a more personal appearance and also be more practical for you to use.

Desktop Background

desktopOne of the more common customisations is to put your own picture onto the background. You can either choose one static image or select a folder and have the images rotating every few minutes.
On Windows 7 or 8 in the desktop view, right-click any spare are of desktop and select Personalize. Highlight Desktop background and browse for the image(s) you want. If you select multiple images, use the settings at the bottom to choose how often to change the pictures.

Screensaver

You can customise your screensaver in a similar way too. From that same Personalize menu choose Screensaver. From the dropdown box choose photos and use the settings button to select your folder of images. Set how long you want the PC or laptop to be inactive before the screensaver kicks in.

Icons

shortcutWhen you install applications sometimes you will get a shortcut to the application appear on your desktop. This is an image you can click on which will open the relevant application. Shortcuts can also be created for documents , web pages and folders as well. Shortcut icons can be distinguished from actual files by the black arrow in the bottom left corner.

If you get too many shortcuts on your desktop you can delete them, either by highlighting and pressing the delete key or right-click and select delete.

You can organise your icons by right-clicking on the desktop and selecting Sort By and then the order you want your icons. Right click the desktop and select the view option to auto-arrange your icons and change the size.

Task Bar

Rather than fill your desktop up with shortcuts and icons, a simpler way to manage applications and documents you use regularly is to pin them to the Task bar at the bottom of the screen. To do this, when the application is open, right-click on the icon in the task bar and choose Pin to taskbar. You can also pin individual documents, which can be accessed again by right-clicking the icon in the Task bar.

Windows 8 Charms

Windows 8 CharmsWindows 8 has an alternative Metro interface which displays your documents and program links in a series of colourful Charms. You can still customise this interface by dragging and dropping Charms to change their location.

To remove a Charm, right-click and select unpin from Start menu. To add a Charm for a file or program, use the Search function to find your file or application, right-click on the related search result and click Pin to Start menu. You can Pin and Unpin items to the Desktop taskbar from this command also.

Hopefully this short article has helped you customise your PC but if you would like further information or some training please contact us.

Transferring Photos from your camera or phone to your PC

July 14th, 2014

cameraThese days it is rare to find anyone with a traditional film camera. Everything has gone digital and, although this offers a cheap and easy way to take and produce photographs, most people don’t want to just have their images stored on the camera or phone they were taken with.

So, how do you transfer your photos onto another device and what can you do with them?

There are generally two methods of getting your images from the device they were taken on to a PC or laptop.

  1. Remove the memory card and insert it into a compatible card reader on the PC or laptop
  2. Connect the phone or camera via a compatible cable (normally USB) or via wireless or Bluetooth

Whichever method you use, the process is similar.

When you plug in your camera or phone or insert the HD card, your PC or laptop will detect the new device and attempt to install the relevant drivers. It will usually do this itself but sometimes you may need to insert the CD that came with your device or download a file from the manufacturer’s website.

The device should then appear within Windows File Explorer like an additional hard drive. Double click on it to navigate through to the location of your photographs. You can then select the images and copy and paste or move these images by dragging and dropping.

PhotosDepending on your Operating System, when the camera or card is detected you may get a box pop up asking if you wish to transfer the images to your Pictures folder and if you want to do this every time the device is connected to your PC or laptop.

Once your Photos are on your PC or laptop you can select to have one as your desktop (right click and select Set as desktop background), select a whole folder to give rotating background images (right click on the desktop, choose Personalize >> Desktop Background and set as applicable) or play them as a slideshow (Open the folder in Windows Explorer and select Slide Show from the menu at the top).

Is it worth repairing my laptop?

July 7th, 2014

At some time or another, accidents will happen. The classic scenarios we see are laptops trodden on after being left on the floor or stairs, laptop lids closed on pens or other items which crack the screen or glasses of wine or other drinks tipped over the keyboard.

So what can you do if this happens to you, and, if physically damaged, is it worth repairing your laptop or more economical to bin it and start again?

Liquid spills

Spillage on laptop keyboardIf you are unfortunate enough to get your laptop, tablet or phone wet, remove the power lead, if plugged in, and switch it off straight away – hold the on/off button in until it powers down, don’t worry about shutting down programs etc. as time is of the essence!

Remove the battery, mop up any excess liquid then leave it somewhere dry and warm to completely dry out but not right on top of a radiator or fire! A warm airing cupboard is perfect. It can take 2 or 3 days to completely dry. Don’t try to switch it on until you are sure it will be dry inside.

If you are lucky, once completely dry the unit will switch on and carry on as normal. If not, then it may be necessary to strip the unit down and clean the circuit boards, especially if the liquid was sugary such as wine or fruit juice.

If the unit is completely dead then it is likely that the motherboard has short circuited. In this case, chances are it will not be worth repairing and it would be more costs effective to claim on household insurance for a replacement.

Physical Damage

Laptop with cracked screenDepending on the age of the laptop, some hardware repairs are worth considering. Screens can vary from £60 – £200 depending on the age and type of laptop. Keyboards cost around £30 – £50 and we can even supply individual keys.

We regularly see broken power connectors where cables have been caught. Again, these can be replaced fairly economically. Replacement batteries and power supplies can also be purchased relatively inexpensively.

Motherboards and processors are generally not worth repairing unless the laptop is 12 months or less old.

Will I lose my data?

With liquid spills and most hardware failures, the hard drive should be OK. Don’t send the laptop off to an insurance repairer or assessor without getting a copy of the data first. This can be done by a local IT company or, if you feel competent in basic electronics, by removing the hard drive and connecting to another PC.

If the laptop has been dropped or crushed then the hard drive may have been physically damaged. Hopefully you will have an up to date backup on another drive or in the cloud but, if not, it may be possible to retrieve the data via more advanced methods. This can cost between £250 and £750.

See our laptop repair section for further details.

Who’s Accessing Your PC?

April 30th, 2014

Handcuffs  Last month a Luton man was successfully prosecuted for scamming users into paying for free software. He had hired a number of call centre staff in India to call UK residents and to trick them into giving them remote access to their PC’s. The caller would tell the victim that their PC had a serious issue and that they could fix it for them. They then charged victims between £35 and £150 for software which could be downloaded from Microsoft for free.

Trading Standards have hailed this as a landmark case, the first time a UK resident has been convicted of the Microsoft scam, however, there are many more copy-cat scams in place so how do you make sure you don’t fall victim?

Firstly, Microsoft do not make outgoing calls to their customers – never! If you get a call from anyone who says they are calling directly from Microsoft then it’s simply not true.

Secondly, unless you are paying for a managed support service on your home PC, no third party company would know if you had a virus or other issue with your PC and be able to get in contact with you about it.

Worried userSome of these callers can be very convincing and, with most users conscious of the number of viruses and security around, it is easy to be lulled into thinking that something terrible is happening with your PC, but if anyone calls out of the blue and wants access to your PC, don’t let them in!

If you are worried that you may have a virus or malware on your PC, make sure that your anti-virus software is up to date and running properly then run a full scan. Once the scan has completed, follow any instructions carefully to ensure that any infections are successfully removed.

If in doubt, contact a reputable local IT company who will have the tools available to remove any infections.

CryptoLocker Ransomware – Don’t get Caught

April 25th, 2014

Man in despairI am sure most people are aware that there are some pretty nasty bugs and malware being sent around the Internet.

Some hijack your email and send spam to your address book, others are designed to sit secretly in the background and simply use your systems resource and internet connection as a gateway to send spam or process tasks in the background. Some try to steal your identity or personal information either through logging your key strokes or duping you in to entering personal details into a fake website. Some will try to ‘break’ your system by changing settings or files .

Now, these are not nice and can be a nuisance to get rid of. Generally, any decent anti-virus product will protect your system and stop these programs from running or at least stop them in their tracks. You can then restore any damaged or missing files from your backup, though normally any data will be retrievable anyway, even in the case of a complete reload of the system.

There is one virus however, which can cause the loss of all your data and files and for which there is currently no known resolution apart from paying a lot of money – and even that will not guarantee a return of your data.

The CryptoLocker virus sits dormant on an infected machine until that system is rebooted. This then triggers a file to run on restart which secretly works its way through your files encrypting them and making them unreadable. Not only will it work its way through your hard drive, but it will search through any mapped network drives or connected USB drives encrypting them also.

Screenshot of Cryptoware warningAs a final nail in the coffin, it will attempt to delete and disable any historical shadow copies, just to make doubly sure you have no way of retrieving your precious data.

Only when it has finished will it display its message on your desktop to tell you your system is infected and with details on how to pay and retrieve the key to decrypt your data.

So, how can you protect yourself? Generally the virus is transmitted via an email attachment. These are appearing more and more genuine and those we have seen include Companies House submission reports, Bank statement notifications, delivery instructions from major courier companies and HMRC tax return notifications. The attachment pretends to be a pdf document but is in fact an executable file which runs and then infects.

Image of Bullguard protection software packageFirstly, do not open or even preview an email you are not expecting from these sort of sources. If in doubt, delete it.

Secondly, make sure you are running up to date, valid anti-virus software. This will help to pick up any known executable files as they run on your system.

Thirdly, there is a small application, written by FoolishIT LLC which can be installed on a PC to help protect against this particular threat. It stops certain file types running in certain locations on your PC. This will help to protect against the virus but may possibly impact some other 3rd party software also. You can download CryptoPrevent from the following page: http://www.foolishit.com/download/cryptoprevent/

Backup imageFinally, make sure your system is regularly backed up but, if you back up onto a USB disk, do not leave this permanently attached to your PC. Depending on how you back your files up, this could become encrypted also should you be infected.

Should you be unfortunate enough to be a victim of this virus, and you simply must try to retrieve your information, you have a limited time to follow the instructions and decrypt your files. Currently, there is no other alternative to retrieving any encrypted data. Success rates vary and paying the ransom does not guarantee your files will be saved. If you do want to take this route, then do not make any attempt to clean your system until you have tried to decrypt your files. If you remove the key files from your system then you could end up having to pay more money or not be able to decrypt your files at all.

For more information on keeping your systems safe and secure, please contact us.

Get Connected – Guide to Home Broadband

April 20th, 2014

These days I think you would be hard pushed to find a home with a computer or mobile device and no Internet access.Router

We find when talking to people about to buy a new computer, when we ask what they want to use it for ‘Surfing the Web’ is normally one of the first things they say.

But does all that technical jargon about speeds and uploads confuse you? Do you know what you’re signing up for (or what you’ve already got!) and how do you know you are getting what you signed up for? Here’s a few hints and tips which might help.

Different types of connection

There are many different forms of connection but the most common ones for households are:

FibreFibre – supplied by companies like Virgin, Fibre Optic broadband offers one of the fastest service for domestic customers. It is independent of your telephone line and requires a dedicated fibre optic cable to be run to your home. This is often bundled with Cable television services. Whether you can get this service depends on whether any Cable companies have installed a cable network in your street.

Fibre to the Cabinet– services such as BT’s Infinity service operate over Fibre Optic cables to your street corner cabinet but then use your copper telephone wire for the last part of the journey. Although this requires an engineer visit to set up, there should be no need for any cabling work to your home. Speeds will vary depending on how far away you are from your street corner BT box as the signal degrades over the copper line the further it has to travel.

ADSL – This connection runs over copper wires from the Exchange, to the street box and then on to your home. This connection does not require an engineer visit to install, your provider will send you a router, which is generally pre-configured, and the service is ‘switched on’ remotely by your service provider. The speeds you get will depend on your distance from the Exchange.

Mobile – You can get a connection to the Internet by using either a compatible mobile phone or by purchasing a USB dongle Mobiles with connection to broadbandwhich connects using mobile signals. The price for this service is either included in your mobile phone contract by way of a Data tariff or with a USB dongle on a pay as you go scheme based up a certain amount of data usage. These services are great if you do not want, or cannot get, a fixed line service to your home or if you travel a lot but they do require a good mobile phone signal to work and speeds will not be as great as a fixed line service. Also ensure that your tariff will allow for the amount of data you will be using so as not to get large, unexpected bills!

Speeds

The speeds you get will vary depending on your type of connection and your location. You have 2 speeds to consider – Upload speedwill generally be slower. That is the speed you will get when uploading data to the Internet such as sending emails or uploading photographs to social media sites or using a remote backup or file storage service like DropBox.

DownloadingDownload speed is the faster speed and this applies to browsing the Internet, receiving emails and downloading files, movies or music.

Speed is generally calculated in Mb/s or Megabits per second. Basically, the higher your Mb/s the faster your connection.

This should not be confused with MB – MegaBytes. This relates to file sizes, but can also be important as some providers will have a limit to the amount of data that can be downloaded.

Checking your connection

The best way to check your connection is to use an online speed test tool. This can normally be found on your provider’s website or by doing an Internet search for Speed Test. These tests should be run on a computer that is connected to your router by a cable rather than wirelessly, as this can affect the reports. You should also check that no-one else in the household is connected to the Internet and downloading or uploading anything as this will also affect the results. The tests will run through and then tell you what your upload and download speeds are. You should run these a few times to get an average result. If the speeds reported are significantly different to the speeds your provider says you should be getting then do speak to them about it. It could be that there is a fault on your line or with the connection, which they can repair to improve things.

So you think you’re a careful Internet user?

April 10th, 2014

Photo of girl on phoneThese days it’s hard for us to avoid doing certain tasks online. Even if you prefer to receive you bills and statements manually, buy items in person on the High Street and don’t use Social Media, many of us will use a computer to browse the Internet and use Email.

So how much of the data we enter on our computers, or even fill out in coupons, can find its way into the Public domain? The answer is, more than you probably think!

Let’s think about an average day for our Virtual user, let’s call her Stacey. Stacey gets up in the morning and the first thing she does is check her Facebook page and respond to a friend’s photo taken last night. Most Social network sites will register your GPS co-ordinates when you post or even take a photo on your mobile phone, so that gives a pretty accurate idea of where Stacey’s friend was last night and where Stacey is this morning. As she always checks her Facebook page when she wakes up, that builds up a regular location and so without knowing Stacey’s address, we could assume that she lives at that location as she adds a post from there first thing most mornings.

Stacey makes her way to work. On the bus, she checks her personal emails. There’s an email in from a shop she goes to regularly. She has a loyalty card with them (which means they will know what products she purchases and when) and they are offering a chance to win a product she really likes. She enters the competition on line, giving her address and date of birth. She doesn’t check the box to deny access to this information from 3rd parties, so she’s probably now going to receive lots of other related offers either through the post or via email.

She gets to work and logs on to her computer and starts work. It’s a busy morning and the time flies by! At lunchtime she needs to check details of an order she placed recently with a mail order company. She tries to log in emailbut can’t remember her password, so gets a reminder sent to her personal, free email account. To do that, she has to enter her secret questions – date of birth and Mothers Maiden name. That’s right, it was her usual password. Uh, oh! One password for everything? Plus using 2 pieces of information that are commonly used to prove identity for Banking?

OK, so we would like to think that all companies treat their customers data as top secret , and the majority do, but we hear of cases where information does get in to the wrong hands occasionally. Try not to use the same password all the time, or have something that is too personal (date of birth, name of your house, favourite team) and don’t be afraid to lie if asked for the information and it’s not for a genuine identification purpose like a Bank, Inland Revenue or DVLA where it will be used to cross reference with other databases.

Stacey notices that in her email web portal she is seeing adverts relating to blue prom dresses. That’s strange, she was only looking at those last night on the web! It’s not a coincidence. Most free services such as Gmail and Yahoo are free because the companies are getting paid by the advertisers, and not just for space. Although personal identification details don’t get sold, they will pass on details of searches you carry out, phrases or words mentioned in your emails and websites you visit. This allows them to tailor the adverts you see to things supposedly relevant to you.

Lunch hour over, it’s back to work. Stacey takes the opportunity to update her Linked In page with some updated employment and education details and updates her contact information with her new mobile number. Although Linked In is a business networking site, it’s still posting personal information that’s available for all to see. Plus, there’s a lovely photo on there that she’s really proud of. Looks very professional (and now everyone can put a face to the name, email address and phone number!)

drinksAfter work, Stacey is catching up with some friends for a drink. They keep in touch via Social media about where they will meet and what time.

During the evening they all post comments and photos on Social media. Again, it’s advertising where they are and what they are doing. Looks like it’s going to be a long night… wonder if there’s anyone else at home??

So, should we pull down the shutters, bolt the doors and never venture into the virtual world again? Is it all full of crooks and villains just waiting to grab the first bit of information we put in the public domain? In reality, no, but it’s wise to be careful and think about what you are posting and where.

For example, taking a nice photo of your house and secluded back garden and posting on Facebook, at the same time as mentioning your up and coming 2 week family holiday, is not to be recommended!

As mentioned before, try to avoid using personal details where they are not required for proper identification purposes and read the small print carefully when filling out forms, both online and on paper (as they will just get entered onto a computer somewhere too eventually!)

Finally, check the privacy settings on your social media accounts to make sure that details are only shown to those you want to see them rather than being open to all.

 

What is Cloud Computing?

April 3rd, 2014

Cloud – it’s been a big buzz word in the computing world for a few years now. But what does it mean and do you need it?

CloudBasically, Cloud Computing is where you use software, services or storage through your PC, laptop, tablet or mobile device and that software or storage is not local to your device or network but accessed via the Internet.

Many people have probably been using this for some time without even realising it! If you access you email through a web site rather than downloading it with an application like Outlook then that can be classed as Cloud Computing. If you use DropBox, GoogleApps, Facebook, Twitter – they are all effectively Cloud services or solutions because you are storing or accessing your information via a server and network somewhere else in the World.

As time goes on, more and more applications and solutions are turning to the Cloud to offer customers greater functionality, storage and applications with the customer having to invest in expensive hardware or software locally. As long as you have an Internet connection then you can generally access these services and files.

Cloud services logosIs it safe? You need to treat Cloud Computing and the Internet with care. At the end of the day, if you are using a cloud-based back up service or storing your data in GoogleApps, DropBox or some other similar online service then that storage space is out of your control.

Reputable companies will do all they can to maintain clients privacy and security. Many of them have larger, expensive corporate services as well as the cheaper or free consumer offerings and the last thing they would want to do is jeopardise those relationships with a security scare. However, users need to take steps to secure their data and protect themselves too.

Be aware that many free services offer no guarantee of uptime or protection of your data from deletion or corruption. In other words, don’t rely on a free service as the only means of storage of vital or precious documents or photos.

Make sure your online accounts are secure with strong passwords and usernames and that you change these regularly. Don’t use the same user name and password for everything!

Finally, make sure you read the terms and conditions before signing up to an online service to see if there are any restrictions on what you can upload or use the service for, the amount of storage you will get or the bandwidth you will have for access and if the company retains any rights to ‘interrogate’ or view your data.